Virus Script Flashcards
PART 1
Good morning, today I’ll be covering the unit’s updated virus and malware procedures, based on AR 25-2 and DISA STIG guidance
PART 2
Our SOP now ensures that all systems have approved antivirus, installed before they ever touch the network. These systems follow current STIG settings—real-time protection, scheduled scans, and automatic updates—to stay secure and compliant with risk management standards
PART 3
Antivirus signatures must be updated every 7 days. Weekly checks verify every device is protected. If a system falls behind—missing updates or scanning is turned off—it’s flagged and immediately sent for remediation by the ISSO
PART 4
All antivirus is managed centrally through an enterprise server. This ensures all machines are the same and allows us to push updates out quickly. Daily reports help us track which systems are out of line and take action right away. That gives us a constant cycle of monitoring, reporting, and improvement
PART 5
AV tools handle threat detection automatically. They scan in real time and identify malware before it becomes a problem
PART 6
When a threat is detected, the system is quarantined or isolated to stop the spread. Users are not to engage with the infected file—cyber personnel handle it from there
PART 7
Before a system comes back online, the ISSO verifies the full scan and confirms the system is clean. Everything gets documented for compliance. No shortcuts
PART 8
That’s how we manage detection, quarantine, and reporting—centralized, accountable, and in line with Army cybersecurity standards.